This Week’s Five is a weekly column of five interesting reads from all over the web, with a different topic each week. This week, we’ll explore the...
IT outsourcing: When outsiders become insiders, how do you ensure information security?
Organizations outsource a part or whole of their IT services to third-party service providers for various reasons, such as cost savings, leveraging outside expertise, need...
The Next $100 Billion Technology Market?
Just as we are getting our arms around terms like B2B and BYOD, the latest technology acronym emerges — M2M. And this one is big...
IT Business Acquisitions And The Side Effects On Customers
Originally published in (Business Computing World) Like any other, the IT market has software vendors of different sizes ranging from small to large. The core...
Different Kinds of Help Desk Callers – Helpdesk Humour
Embed Code: <img src=”http://www.manageengine.com/products/service-desk/images/helpdesk-infographics.jpg” alt=”Different kinds of Help Desk Callers” /><p><em>Image originally posted on <a href=”http://www.manageengine.com/products/service-desk/helpdesk-infographics.html”>Help Desk Infographics, ManageEngine ServiceDesk Plus</a></em></p> Share & Get a...
This Week’s Five: The Rise of Mobile Device Management
This Week’s Five is a weekly column of five interesting reads from all over the web, with a different topic each week. This week, we’ll explore the...
Media round up!
June saw some great coverage for ManageEngine. Here are some of the articles and interviews that were carried in leading publications. Insider threats become primary...
This Week’s Five: Arm Your IT; Secure Your Network
This Week’s Five is a weekly column of five interesting reads from all over the web, with a different topic each week. This week, we’ll explore possible...
Policy-Driven Network Configuration Management Critical to Network Security
(Originally published in Information Week) Manual processes to managing device configurations often create gaping security holes! Today’s enterprises face unprecedented cyber-security threats. New breed of...